The Right and Wrong of the Hollywood Hack

The Right and Wrong of the Hollywood Hack

Movies and television shows are a big part of our culture. When hackers are portrayed on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of plot. Today, we will look at hacker portrayals, and what Hollywood gets right, and what it gets completely wrong.

Hackers in Hollywood
Ever since the mid-1990s, when the Internet started to grow fast, screenwriters have been authoring stories about computer hackers. After all, they provide one of the essential characteristics of any story, conflict. In movies and television, hackers are almost exclusively portrayed by young, anti-social people; and, are typically seeking revenge for some perceived slight brought on them or their family by some type of corporate entity.

If they don’t fit that paradigm, then they are typically dystopian science fiction movies/shows where they are hacking to save humanity from nefarious machines, subversive human groups, or aliens. This, of course, is in contrast to the way that we look at hackers; and, while there are a fair amount of “white hat” hackers that work for the “good guys” to expose vulnerabilities for organizations to help keep them safe, most hackers are simply trying to get over on the people and organizations they target.

Differences Between Reality and Perception
One of the major differences in perception is in what a hacker does. In the media, the hacker is portrayed as sitting at a high-powered laptop that they keep in their jacket, typing 80 words per minute without a mistake, cracking system encryption like he/she was sending an email.

This is your average hacker screen from a movie or tv show:

Of course, this is completely ridiculous. In reality, a video of a hacker sending an email would be more apt. A real hacker’s screen is one with function. There are command prompts and open windows with real applications that help them diagnose possible vulnerabilities. Today’s hackers' screens most likely look a lot like your screen, with browsers open, a word processing app to create content, and maybe a graphics problem for the hacker with ingenuity.

The act of actually hacking into an organization's network requires more research than typing-pool skills. In fact, for today’s hacker, the computer and applications they use is as much of the story as is the timing. It’s simply not cinematically pleasing to sit around and watch people type, so they come up with all types of ludicrous graphics to represent the network's security they are trying to work around.

People need to know how to protect themselves against hackers, and BNMC’s IT experts can help. Call us today at 978-482-2020 to get started learning how to protect yourself against today’s most powerful hacks.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, March 23 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Business Computing Malware Hackers User Tips Network Security Google Productivity Tech Term Software Business Microsoft Computer Internet Communication Mobile Devices IT Services Hosted Solutions Efficiency Ransomware Smartphone Small Business IT Support Data Hardware Android Innovation Cloud Computing Data Recovery Backup Saving Money Managed IT Services Business Continuity Microsoft Office Windows 10 Browser Windows Data Backup Internet of Things Workplace Tips Data Management Managed IT Services Windows 10 Outsourced IT Passwords Productivity Vulnerability Cybersecurity Server Users App Business Management Artificial Intelligence Gmail Disaster Recovery Word Encryption Chrome Remote Monitoring Facebook Phishing Mobile Device Upgrade Office 365 communications BYOD Information Network Tip of the week Money IT Support Applications VoIP Smartphones Employer-Employee Relationship Managed Service Provider Analytics Managed Service Infrastructure Social Media Website Office Tips Display Maintenance Hacker Data storage Big Data Antivirus Robot Save Money Router Settings Automation Google Drive Virtual Reality Paperless Office Content Filtering Access Control Company Culture Bandwidth IT Management Miscellaneous Employee-Employer Relationship YouTube Apple Government Risk Management desktop Retail Alert Laptop HIPAA Firewall The Internet of Things Two-factor Authentication Mobile Security Avoiding Downtime Document Management Spam Computing Monitors Scam Outlook Vendor Management Chromebook Operating System Downtime Wireless WiFi LiFi Business Intelligence Hosted Solution Gadgets Networking End of Support Administration VPN Mouse Data Security Business Technology Server Management SaaS Virtual Private Network Touchscreen Managing Stress Education Unified Threat Management Quick Tips Data loss Storage Printing Computers Holiday Tablet Telephone Systems Development Dark Data Update Mail Merge Blockchain Alerts USB Legal Mobility Buisness Downloads Digital Payment Motherboard Cables Password Shortcut Distributed Denial of Service Disaster Fraud Cost Management Unified Communications Drones Co-Managed IT Sports VoIP Unified Threat Management Digital Identity Continuity Windows 8 Virtual Desktop Charging Onboarding Firefox Superfish Smart Office Software as a Service Politics Bluetooth Comparison Collaboration Screen Reader Slack Customer Service Address Permissions Licensing Dongle Deep Learning Print Toner Wires Mobile Device Management Patch Management Managed IT Service Uninterrupted Power Supply Assessment Content Office Samsung User Error Spyware Solar Messaging Smart Tech Digital Signage Customer Relationship Management Computer Care IBM Work Alt Codes Entertainment Tech Support Specifications File Sharing Monitoring Cybercrime Solid State Drive Cooperation Service Level Agreement Bring Your Own Device Shortcuts Heating/Cooling Multi-Factor Security Voice over Internet Protocol Break Fix Hotspot Internet Exlporer Budget Streaming Marketing Social Engineering Time Management Printer Identity Theft Compliance Social Connectivity Information Technology Troubleshooting Training Corporate Profile IT Technicians Optimization Typing Humor iOS Websites Search Black Friday Current Events Spying Emergency G Suite Hard Disk Drive Staff Leominster Best Practice Security Cameras Servers Google Calendar Automobile Modem FinTech Dark Web Dell Language Value Human Error Safety Network Management Regulations Analysis Cyber Monday Cabling IoT Apps Halloween Remote Computing WannaCry Mirgation Recycling Cryptocurrency Scalability IT solutions Going Green Network Congestion Augmented Reality K-12 Schools Google Docs Managed Services Legislation Google Maps Cookies MSP Microsoft Excel Computing Infrastructure Professional Services Device SharePoint Social Networking Hacks Managed IT Smart Technology Star Wars Google Wallet LED Writing Scary Stories Techology Chatbots eWaste Bitcoin Migration Wi-Fi PowerPoint Running Cable Virtualization How To Lenovo Wearable Technology Network upgrade Business Growth Laptops Statistics Nanotechnology Cameras Meetings Tracking Windows 7 Computer Repair Relocation Cleaning Mobile Data Recovery CCTV How To Work/Life Balance BDR Private Cloud Webcam Health Regulation Black Market Law Enforcement Error Mobile Computing Electronic Medical Records Point of Sale Ben McDonald shares Notifications Travel Twitter Physical Security Emoji Upgrades Gadget Crowdsourcing Supercomputer CrashOverride Motion Sickness Printers Staffing Personal Information Botnet Cortana Taxes 3D Printing Administrator Web Server what was your? IT Budget Processors GPS Machine Learning IT Consultant Unsupported Software

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3